EXHIBITOR LIST GET YOUR FREE PASS

HOSTED BY

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

OFFICIALLY SUPPORTED BY

ORGANISED BY

10:15 – 10:20
GOVERNEMENT STAGE HOSTED BY DESC   Moderator's Opening Remarks GISEC MAINSTAGE
Speakers

Nathan Swain CISO Europe, Asia & MENA region, Binance Former Senior Security Advisor to the U.K. Government United Arab Emirates

10:20 – 11:00
GOVERNEMENT STAGE HOSTED BY DESC   OPENING KEYNOTE ADDRESS GISEC MAINSTAGE Reserved for DESC
Speakers

H.E. Amer Sharaf CEO of Cyber Security Systems and Services Sector Dubai Electronic Security Center (DESC) UAE

11:00 – 11:20
GOVERNEMENT STAGE HOSTED BY DESC   LEADERS PANEL GISEC MAINSTAGE Will enterprises continue to grapple with the significant threat of Man-in-the-Middle (MiTM) attacks in 2024?
2024 is on advancing cybersecurity measures against MiTM attacks through the use of innovative technologies like blockchain, machine learning, and specialized cryptographic systems. There is an ongoing need for developing robust and efficient security protocols to address the evolving nature of threats.
Speakers

Abdullah Marghalany Cybersecurity Chief Officer Ministry of Health General Directorate of Health Affairs in Medina Saudi Arabia

Anas Mosa Director of Information Technology - PIF Projects Public Investment Fund Saudi Arabia

Ahmad Sameer Head of Security Crisis Response Dubai Electronic Security Center (DESC)

11:20 – 11:35
GOVERNEMENT STAGE HOSTED BY DESC   KNOWLEDGE SHOWCASE CISCO GISEC MAINSTAGE
11:35 – 11:55
GOVERNEMENT STAGE HOSTED BY DESC   TRUE STORY GISEC MAINSTAGE Cyber Crisis Management: Lessons Learnt from Bouygues Construction Ransomware attack
Investigating, relaunching and improving systems, acquiring new cyber-tools: a cyber-crisis requires technical skills and offers opportunities for change. But what happens to the men and women who live through it, from the inside as well as the outside: how do we organize them, how do we help them, how do we communicate?
Speakers

Thomas Degardin Group Cybersecurity Director Bouygues Group France

11:55 – 12:10
GOVERNEMENT STAGE HOSTED BY DESC   KNOWLEDGE SHOWCASE PENTERA GISEC MAINSTAGE
12:10 – 12:30
GOVERNEMENT STAGE HOSTED BY DESC   TRUE STORY GISEC MAINSTAGE “Celebgate” that led to the closure of the 168-year-old News of the World tabloid and a trial costing £100m
How attackers hacked celebrity phones and why is it significant today? Celebrity phone hacking is a topic that has raised and keeps raising its’ head. In 2011 the UK suffered the first widespread attack. It resulted in the closure of a 168-year-old newspaper in the UK! The phone hacking scandal, which involved the illegal interception of voicemail messages of politicians, celebrities, members of the Royal Family, and the public. Phil Cracknell was involved in the 2014 UK investigations. He will tell you the whole story and show you how the celebrities were compromised. Information that global phone manufacturers tried to cover up or flatly denied. The outcome of the hacking changed security protocols and authentication methods to what they are today.
Speakers

Phil Cracknell CISO for a UK Defence company & Former Cabinet Office Cyber Security Subject Matter Expert. UK Defence company United Kingdom

12:30 – 12:45
GOVERNEMENT STAGE HOSTED BY DESC   KNOWLEDGE SHOWCASE SPIRE SOLUTIONS GISEC MAINSTAGE
12:45 – 13:05
GOVERNEMENT STAGE HOSTED BY DESC   TRUE STORY GISEC MAINSTAGE Defending Philippine Government Networks from Cyber Attacks in the Age of AI, Big Data and Quantum Computing
Speakers

Ashley Acedillo Deputy Director General for Cyber and Emerging Threats National Intelligence Coordinating Agency Philippines

13:05 – 13:20
GOVERNEMENT STAGE HOSTED BY DESC   True story of 2 major attacks - How we saved the world, tales from a cyber warrior GISEC MAINSTAGE The world used to be simple to secure: our employees used to connect to our data centers on our devices over our networks, this however is a thing of the past and reality is in our hyper connected world everyone attacks everyone everywhere. This presentation delves into the vital theme of ''How we helped stop attackers in their tracks”''. The core of the presentation will talk through one major incident where a customer with over 100,000 employees approached us under the threat of attack from a nation state and we expertly countered a sophisticated cyber-attack targeting our client''s digital assets. Additionally we will talk about how we ourselves became involved in the Twillio “Smishing attack”. Join us in this enlightening session to uncover the strategies and insights crucial for advancing your digital transformation securely.
Speakers

Dave Barnett Head of SASE and Zero Trust EMEA Cloudflare UK

13:20 – 13:40
GOVERNEMENT STAGE HOSTED BY DESC   SPOTLIGHT on Britain's greatest fraudster turned Cybersecurity Advocate Evolution, Through the eyes of a criminal 2024: Synthetic I.D. GISEC MAINSTAGE An Author, a TV producer and Co-founder of We Fight Fraud. Also know as Britain's Greatest Ex Fraudster.  Since turning his life around over a decade ago, he has been advising Governments globally and  some of the worlds largest brands on their fraud and loss strategies. Today he is widely recognised as one of the world leading experts in social engineering, fraud and cyber crime. In  this presentation Tony will show easy it is for criminals and bad actors to use that data and create Synthetic identification & Deepfakes.  Allowing him and the team at we fight fraud, to dupe KYC processes and open bank accounts at will!
Speakers

Tony Sales Co-Founder We Fight Fraud

13:40 – 14:00
GOVERNEMENT STAGE HOSTED BY DESC   FUTURE TALKS GISEC MAINSTAGE Unmasking the Invisible: Exposing Lurking Threats with Behavioral Analytics
Today, our intrusion detection and response capabilities are signature-based. These signatures look for known TTP''s and are very good at mitigating threats with known attack signatures. However, advanced attackers use Zero-Day vulnerabilities with no known signatures, and they are coming after your identity. Additionally, the use of MFA-Fatigue attacks and API-Key compromises are becoming common to gain access to your secure enclaves. Once inside, they are able to "live off the land", using tools provisioned for your admins without triggering any alarm bells. Behavior-based detection uses enhanced AI/ML capabilities to baseline user behavior. They normalize user behavior over a period of time and alert based on deviations in behavior. Augmenting your Signature-based detection with Behavior-based detection can help reduce attacker dwell time in your networks.
Speakers

Alex Attumalil Global Chief Information Security Officer Under Armour United States of America

14:00 – 14:20
GOVERNEMENT STAGE HOSTED BY DESC   FUTURE TALKS GISEC MAINSTAGE The Flawed Path: Debunking the Efficacy of Current Cybersecurity Training Approaches and How We Can Improve Our Future
This session proposes a radical shift in cybersecurity education and workforce development. It challenges current norms, advocating for early integration of cybersecurity in education and a reimagining of entry-level training. The talk hints at a global approach, emphasizing the need for international collaboration and a comprehensive strategy encompassing both academia and industry. While exploring the potential of on-the-job training, it leaves room for debate on how corporations can play a pivotal role in shaping future cyber defenders. This presentation promises to unveil innovative pathways for nurturing a resilient cybersecurity workforce.
Speakers

Caitlin Sarian Cybersecurity Influencer Cybersecurity Girl LLC United States of America

14:20 – 14:20
GOVERNEMENT STAGE HOSTED BY DESC   Closing Remarks GISEC MAINSTAGE